unwanted software designed to throw advertisements up on your screen, most often within a web browser
Adware
Oops!
Check
Okay!
Check
15
Presenting someone else's work or ideas as your own
Plagiarism
Oops!
Check
Okay!
Check
15
A user wants to complete a transaction in online banking. However, the user is redirected to a fake site that looks like the bank's website.
Pharming
Oops!
Check
Okay!
Check
15
a type of social engineering attack in which cyber criminals trick victims into handing over sensitive information or installing malware, usually via emails.
Phishing
Oops!
Check
Okay!
Check
15
an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element.
Clickjacking
Oops!
Check
Okay!
Check
15
A type of malware installed on your computer or mobile device without your consent. It can gain access to your sensitive personal information and then relay it to other parties
Spyware
Oops!
Check
Okay!
Check
15
A computer program that can copy itself and infect a computer without permission or knowledge of the user.
A virus
Oops!
Check
Okay!
Check
heart
Other team wins 15 points!
Oops!
seesaw
Swap points!
Okay!
shark
Other team loses 5 points!
Okay!
lifesaver
Give 25 points!
Oops!
15
a technique used to keep visitors from leaving their website, e. g. by launching an endless series of pop-up ads
Mousetrapping
Oops!
Check
Okay!
Check
15
a type of malicious software designed to block access to a computer system until a sum of money is paid
Ransomware
Oops!
Check
Okay!
Check
baam
Lose 15 points!
Oops!
magnet
Take 25 points!
Okay!
shark
Other team loses 25 points!
Okay!
banana
Go to last place!
Oops!
15
a type of monitoring software designed to record keystrokes made by a user.
Keylogger
Oops!
Check
Okay!
Check
15
a type of malware that downloads onto a computer disguised as a legitimate program
A Trojan Horse
Oops!
Check
Okay!
Check
15
the use of works protected by copyright without permission for a usage where such permission is required
Piracy
Oops!
Check
Okay!
Check
15
It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.